| |
| |
Acknowledgments | |
| |
| |
About the Author | |
| |
| |
Preface | |
| |
| |
Who Is This Book For? | |
| |
| |
How This Book Is Arranged | |
| |
| |
What You Will Take Away from This Book | |
| |
| |
| |
Introduction to Data Protection | |
| |
| |
What Does Data Protection Mean? | |
| |
| |
A Model for Information, Data, and Storage | |
| |
| |
Why Is Data Protection Important to the Enterprise? | |
| |
| |
Data Loss and Business Risk | |
| |
| |
Connectivity: The Risk Multiplier | |
| |
| |
Business Continuity: The Importance of Data Availability to Business Operations | |
| |
| |
The Changing Face of Data Protection | |
| |
| |
Key Points | |
| |
| |
| |
An Overview of Storage Technology | |
| |
| |
A Quick History of Data Storage | |
| |
| |
Storage I/O Basics | |
| |
| |
The I/O Stack | |
| |
| |
Direct Attach Storage | |
| |
| |
Network Attached Storage (NAS).Storage Area Networks | |
| |
| |
Extending SANs over MAN and WAN.Key Points | |
| |
| |
| |
Backup and Restore | |
| |
| |
The First Line of Defense | |
| |
| |
Designing Storage Systems for Backup and Recovery | |
| |
| |
Recovering from Disaster: Restoring Data | |
| |
| |
Things That Go Wrong with Restore Operations | |
| |
| |
Tape Backup | |
| |
| |
Disk-to-Disk Backup | |
| |
| |
Disk-to-Disk to Tape | |
| |
| |
Backup and Restore Practices | |
| |
| |
Application-Level Backup and Recovery | |
| |
| |
Case Study: Bingham McCutchen | |
| |
| |
Key Points | |
| |
| |
| |
Remote Copy and Replication: Moving Data to a Safe Location | |
| |
| |
How Remote Copy and Replication Are Different from Backup | |
| |
| |
Remote Copy | |
| |
| |
Design Considerations for Remote Copy | |
| |
| |
Replication | |
| |
| |
Case Study: PdMain | |
| |
| |
Key Points | |
| |
| |
| |
Basic Security Concepts | |
| |
| |
Least Privilege | |
| |
| |
Defense in Depth | |
| |
| |
Diversity of Defense | |
| |
| |
Encryption | |
| |
| |
Typical Attacks | |
| |
| |
Key Points | |
| |
| |
| |
Storage System Security | |
| |
| |
The Role of Storage Security in Enterprise Data Protection | |
| |
| |
DAS Security | |
| |
| |
SAN Security | |
| |
| |
Internal and External Vectors | |
| |
| |
Risk | |
| |
| |
Security Practices for Storage | |
| |
| |
Secure Fibre Channel Protocols: FC-SP and FCAP | |
| |
| |
Case Study: Transend Services | |
| |
| |
Key Points | |
| |
| |
| |
Policy-Based Data Protection | |
| |
| |
Difficulties with Data Protection Strategies | |
| |
| |
Data Lifecycle Management (DLM).Key Points | |
| |
| |
| |
Information Lifecycle Management | |
| |
| |
Information Assurance and Data Protection | |
| |
| |
What Is Information Lifecycle Management? | |
| |
| |
Unstructured and Structured Information | |
| |
| |
The Importance of Context | |
| |
| |
Determining and Managing Information Context | |
| |
| |
Location and the Information Perimeter | |
| |
| |
The Information Lifecycle | |
| |
| |
An ILM Schema | |
| |
| |
Matching Information Value to Protection Options | |
| |
| |
The Changing Value of Information | |
| |
| |
Regulatory Concerns | |
| |
| |
Protecting Information Using ILM Policies | |
| |
| |
Controlling Information Protection Costs | |
| |
| |
Automating ILM | |
| |
| |
Case Study: MidAmerica Bank | |
| |
| |
Key Points | |
| |
| |
| |
XML Schemas and Document Type Definitions for Policy Statements | |
| |
| |
| |
Resources | |
| |
| |
Books Worth Reading | |
| |
| |
Organizations and Conferences | |
| |
| |
Web Sites Worth Visiting | |
| |
| |
Government Documents and Resources | |
| |
| |
| |
Acronyms | |
| |
| |
Glossary | |
| |
| |
Bibliography | |
| |
| |
Index | |